Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe
Resource
win10v2004-20240426-en
General
-
Target
9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe
-
Size
4.1MB
-
MD5
ace7d4b394b580be54db4084386bd06e
-
SHA1
85f4b02e12d683ce65e391f534d2abe05038e623
-
SHA256
9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7
-
SHA512
f78ed0723d4230d5cb900b215f946905d78322c48c4dfb6bf15763a34540169b8121df4db06ea6ad4817f081184d2948ae2424a689ee6209a61b14725831e2bf
-
SSDEEP
98304:j3/aXnuKq8lIi6YuYM5DOP1Yy/qFVYXqnggvBm2Aw6XSjras4uEiZDLpDRiiT4:j3/aer8lIiPc9ySnggpxAJiIuBVpFiiM
Malware Config
Signatures
-
Glupteba payload 19 IoCs
resource yara_rule behavioral1/memory/1968-2-0x0000000004770000-0x000000000505B000-memory.dmp family_glupteba behavioral1/memory/1968-3-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1968-144-0x0000000004770000-0x000000000505B000-memory.dmp family_glupteba behavioral1/memory/1968-142-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4256-195-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/1968-213-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4892-215-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-227-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-231-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-235-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-239-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-243-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-247-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-251-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-255-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-259-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-263-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-267-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba behavioral1/memory/4892-271-0x0000000000400000-0x0000000002738000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3084 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 4892 csrss.exe 4828 injector.exe 3420 windefender.exe 3984 windefender.exe -
resource yara_rule behavioral1/files/0x0008000000023412-219.dat upx behavioral1/memory/3420-220-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3420-225-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3984-224-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3984-229-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3984-237-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3984-249-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe File created C:\Windows\rss\csrss.exe 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1716 sc.exe -
pid Process 2828 powershell.exe 4996 powershell.exe 212 powershell.exe 4868 powershell.exe 2640 powershell.exe 4812 powershell.exe 1076 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe 1728 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-151 = "Central America Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2751 = "Tomsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-602 = "Taipei Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-142 = "Canada Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4812 powershell.exe 4812 powershell.exe 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 1076 powershell.exe 1076 powershell.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 2828 powershell.exe 2828 powershell.exe 4996 powershell.exe 4996 powershell.exe 212 powershell.exe 212 powershell.exe 4868 powershell.exe 4868 powershell.exe 2640 powershell.exe 2640 powershell.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4892 csrss.exe 4892 csrss.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4892 csrss.exe 4892 csrss.exe 4828 injector.exe 4828 injector.exe 4892 csrss.exe 4892 csrss.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe 4828 injector.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4812 powershell.exe Token: SeDebugPrivilege 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Token: SeImpersonatePrivilege 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe Token: SeDebugPrivilege 1076 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 4996 powershell.exe Token: SeDebugPrivilege 212 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeSystemEnvironmentPrivilege 4892 csrss.exe Token: SeSecurityPrivilege 1716 sc.exe Token: SeSecurityPrivilege 1716 sc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4812 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 83 PID 1968 wrote to memory of 4812 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 83 PID 1968 wrote to memory of 4812 1968 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 83 PID 4256 wrote to memory of 1076 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 94 PID 4256 wrote to memory of 1076 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 94 PID 4256 wrote to memory of 1076 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 94 PID 4256 wrote to memory of 2316 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 97 PID 4256 wrote to memory of 2316 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 97 PID 2316 wrote to memory of 3084 2316 cmd.exe 99 PID 2316 wrote to memory of 3084 2316 cmd.exe 99 PID 4256 wrote to memory of 2828 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 100 PID 4256 wrote to memory of 2828 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 100 PID 4256 wrote to memory of 2828 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 100 PID 4256 wrote to memory of 4996 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 105 PID 4256 wrote to memory of 4996 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 105 PID 4256 wrote to memory of 4996 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 105 PID 4256 wrote to memory of 4892 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 107 PID 4256 wrote to memory of 4892 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 107 PID 4256 wrote to memory of 4892 4256 9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe 107 PID 4892 wrote to memory of 212 4892 csrss.exe 108 PID 4892 wrote to memory of 212 4892 csrss.exe 108 PID 4892 wrote to memory of 212 4892 csrss.exe 108 PID 4892 wrote to memory of 4868 4892 csrss.exe 114 PID 4892 wrote to memory of 4868 4892 csrss.exe 114 PID 4892 wrote to memory of 4868 4892 csrss.exe 114 PID 4892 wrote to memory of 2640 4892 csrss.exe 116 PID 4892 wrote to memory of 2640 4892 csrss.exe 116 PID 4892 wrote to memory of 2640 4892 csrss.exe 116 PID 4892 wrote to memory of 4828 4892 csrss.exe 118 PID 4892 wrote to memory of 4828 4892 csrss.exe 118 PID 3420 wrote to memory of 4004 3420 windefender.exe 124 PID 3420 wrote to memory of 4004 3420 windefender.exe 124 PID 3420 wrote to memory of 4004 3420 windefender.exe 124 PID 4004 wrote to memory of 1716 4004 cmd.exe 125 PID 4004 wrote to memory of 1716 4004 cmd.exe 125 PID 4004 wrote to memory of 1716 4004 cmd.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe"C:\Users\Admin\AppData\Local\Temp\9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe"C:\Users\Admin\AppData\Local\Temp\9c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:4700
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3984
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56db318f736ca2a41d7bca10c066aa8c5
SHA18a7556d8c507d8e77a3dd287f201b18bb884a2b4
SHA256223337e83aee826b1174afb0d85c2f614fdd1bc3b63e2ae8a83e7eacaa3ed905
SHA5125146f1498eda648067c6c2d22a56ee15f353dfff354ee928a21acf30ecbac7e87e02740f73f7f298259315d047b0913d70904721d74704471bdefc4beafd4f0a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ea612dde15864fd6ff242bb643eb3d07
SHA15b52e3fa273d9fb03df232e6fc35e3ea16048e3c
SHA2562d03f07f2502ced12c1f09d711529888bf52d6442966df041f9d1035469bf428
SHA512e4b6fbd6c15f8942dc2492d40934e626f56b0cad09f8a46f65fe27734210185f3db5b154effc7f1390944e29bebd20fc1ed9179eb996dd181ef92f8fd6c04a37
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57ca85ea345a023899722847ea0a9e959
SHA1f13396a30e2116066489b89bc375d9fa38b36832
SHA25641a771b3a540618cafb13669229b67ee23754d463fa60129021457498c4365e6
SHA5123163cb8c229d70190a25fc5c60b2e4821621859fb308329f760924a34648dcf58a55fe2eea5480b8d5ab11be3b4abe59dc6fb4d684fe7d2213119a199503e755
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD542f9a5c4c79570ca086c3ae7e22ff89d
SHA12aedaf19ca5bc43957fb1b7f18d416fc8cebfb71
SHA2563644590702726434894b30812466ec276d79740488d727a4ef8c8c218fe38e32
SHA51227585d157f5c23f99bd5e6a287187aee6f75d9c73fc3d9927405dd7ab40d75398ee505088b67357f236a8738bf92c4de3dc72d942129853d76e878557172b819
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fa7cd49d89f46c364e6136fad71855b1
SHA15beb0e0688dfc5ee31abee822d5e324bf7e42101
SHA2561937b7f4b47774d3396e593fd88c2ec6098b89d00284761a73e74c82926104f6
SHA5129c5a82276c4c638fca2b74698f63df98e3331ca6878fc3dfc1c817ccfefef4b00bd76b0fdb6aa59aa969ecc97f1ffb1a08bfa126a806546cff502e774ccb7609
-
Filesize
4.1MB
MD5ace7d4b394b580be54db4084386bd06e
SHA185f4b02e12d683ce65e391f534d2abe05038e623
SHA2569c8ea5cc880867ff47a9eb1a15c11eb347daf4d3b38a8a0b9ac2f8326d70b3a7
SHA512f78ed0723d4230d5cb900b215f946905d78322c48c4dfb6bf15763a34540169b8121df4db06ea6ad4817f081184d2948ae2424a689ee6209a61b14725831e2bf
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec